Advantages

Never Doubt the Integrity of Your Data Again. Seriously, Never.

Tamper-Proof Data

Hacking and spoofing attempts are rendered ineffective by cryptographically signing data within the device itself. Any doubts about data veracity during or after transport are removed as integrity is maintained from its source.

Immutable Data

IOT-SAS leverages blockchain technology to store either a hash or the raw data itself.

A key property of this technology is immutability or unchangeability, allowing absolute and irrefutable proofs about the data to exist.

Third-Party Auditable

Blockchain allows for a shared and completely trusted record of data.

This can be achieved through a public blockchain or a permissioned, private architecture.

How it Works

Our Technology

Powerful Without the Power Drain

Secure your data, as close as physically possible to its source, using our IOT-SAS cryptographic signing micro-controller. Accelerated cryptography, yet low power consumption, in a package that suits you.

1.

Small SMD package integrates into your own micro electronics

2.

A powerful .NET micro-controller, fully supported by us

3.

Raspberry Pi & Arduino adapters

Use Cases

We are Entering a Crucial Time for IOT Data Integrity

Deep-fake videos

Quote From The Washington Post

"Speaking of 'deepfakes,' or media manipulated through artificial intelligence, the actress Scarlett Johansson told The Post that 'the Internet is a vast wormhole of darkness that eats itself.

Ms. Johansson’s comments appeared in a report in The Post about how individuals’ faces, and celebrities’ faces in particular, are grafted onto pornographic videos and passed around the Web — sometimes to blackmail, sometimes just to humiliate. But deepfakes could also have applications in information warfare. A foreign adversary hoping to influence an election could plant a doctored clip of a politician committing a gaffe. Convincingly edited video could confuse military officers in the field. The ensuing uncertainty could also be exploited to undermine journalistic credibility; tomorrow’s deepfake may be today’s 'fake news.'"

Signed at Source™ Potential Benefits

Irrefutable proof of author/originator of content

Irrefutable proof of time/date the content was created

Irrefutable proof of location where content was created

In The News

In May, a fake video appeared on the internet of Donald Trump offering advice to the people of Belgium on the issue of climate change. "As you know, I had the balls to withdraw from the Paris climate agreement," he said, looking directly into the camera, "and so should you." - The Guardian

Use Cases

We are Entering a Crucial Time for IOT Data Integrity

Drones

Quote From Sky News

"A drone came within 20 metres (65ft) of hitting a jumbo jet as it flew into Heathrow Airport, it has been revealed.

Details of 18 near misses between the devices and aircraft in Britain's skies have emerged following major disruption at Heathrow and Gatwick in recent weeks.

In one incident on 22 July, the pilot of an Airbus A380 spotted a 'large commercial drone' pass along the right side of the aircraft at 3,400ft (1,036m).

The device - which came 'within approximately 20m' of the plane - was being flown in a way which was 'endangering other aircraft' and involved the highest risk of collision, the UK Airprox Board (UKAB) said."

Signed at Source™ Potential Benefits

Live monitoring of drone data, including real-time locations to map positions as well ability to map historical flight paths

Unique digital identities so drones can be easily identified and linked to a registration, commercial operator license or company

Secure and immutable data

Ability for third-party audits by use of a public or permitted private blockchain

In The News

Reports of unmanned aircraft (UAS) sightings from pilots, citizens and law enforcement have increased dramatically over the past two years. The FAA now receives more than 100 such reports each month - FAA

Use Cases

We are Entering a Crucial Time for IOT Data Integrity

IoT Data Integrity

Quote From Bodil Josefsson, Ericsson's Head of IoT Security

"Another area drawing customer concerns is data integrity. Data is the life blood of IoT operations and it’s critical its integrity is robust. All parties involved must ensure their data has not been manipulated or tampered with while at-rest, in-transit or in-use.

Privacy and confidentiality is another area related to data integrity. Personal data, as well as any generated by an IoT device must be protected, regardless whether it is in-transit or at-rest. Organizations should encrypt their data to ensure it arrives unaltered, where it’s needed."

Our team

About Us

01 / 04

CEO

Dennis Bunfield

Dennis has over 25 years of professional experience in software development for high performance real-time hardware-in-the-loop simulations. His expertise includes vast knowledge of embedded systems and cryptography. Recently Dennis has added Factoid & Entry Credit support for the Ledger Nano S and upgraded firmware to handle Factom Identities.

02 / 04

CTO

Stuart Johnson

Stuart has 30 years of professional experience in electronics, telecommunications and software development. He founded Logic Ethos in 2009 to develop GPS tracking solutions for the UK’s vehicle breakdown industry. Logic Ethos now operates hardware connecting hundreds of sites and thousands of vehicles/smartphones across the UK and South Africa.

03 / 04

CMO

Tor Hogne Paulsen

Tor is a visionary and strong proponent for decentralized and autonomous organizations. He is currently one of five Factom Guides directing the protocol and building out its fundamental governance as a community elected official. Tor’s expertise is vast and he is well connected in the space.

04 / 04

CFO

Benjamin Dufty

Ben has several years of experience in business analytics. His expertise is in financial modelling as well as developing business intelligence tools for large corporations. Having worked alongside various stakeholders, from developers to CEOs, he offers a range of skills in business development & strategy.